|
Christien Rioux, also known by his handle DilDog,〔(【引用サイトリンク】title=L0pht in Transition )〕 is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder. Educated at MIT, Rioux was a computer security researcher at L0pht Heavy Industries and then at the company @Stake (later bought by Symantec).〔 While at @stake he looked for security weaknesses in software and led the development of Smart Risk Analyzer (SRA).〔(【引用サイトリンク】title=Veracode: Christien Rioux )〕 He co-authored the best-selling Windows password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system.〔(【引用サイトリンク】title=Christien Rioux, Co-Founder and Chief Scientist )〕 He is also a member〔(【引用サイトリンク】title=Cult of the Dead Cow: Team Bios )〕 of Cult of the Dead Cow and its Ninja Strike Force. Formerly, he was a member of L0pht.〔(Security Scene Errata )〕 DilDog is best known as the author of the original code for Back Orifice 2000,〔〔Messmer, Ellen, "(Hacker group Cult of the Dead Cow tries to convince world its Back Orifice tool is legit )," Network World, July 14, 1999. Retrieved April 17, 2007.〕〔cDc communications. "(Back Orifice 2000 Press Release )." CULT OF THE DEAD COW Press Release, July 10, 1999. Retrieved April 17, 2007.〕 an open source remote administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow."〔Dildog, "(The Tao of Windows Buffer Overflow )," ''CULT OF THE DEAD COW'' issue #351, May 1, 1998. Retrieved April 17, 2007.〕〔Park, Yong-Joon and Gyungho Lee, "(Repairing return address stack for buffer overflow protection )," ''Proceedings of the 1st conference on Computing frontiers'', ACM, 2004. Retrieved April 17, 2007.〕 ==Security advisories== Significant security advisories that Rioux authored or coauthored include: * (【引用サイトリンク】title=Advisory: Microsoft Internet Explorer 4.0(1) Suite ) * (【引用サイトリンク】title=L0pht Security Advisory: Microsoft Windows NT 4.0 ) * (【引用サイトリンク】title=Advisory: PamSlam ) * (【引用サイトリンク】title=Advisory: Microsoft Office 2000 UA Control Scripting ) * (【引用サイトリンク】title=Advisory: Windows Still Image Privilege Elevation ) * (【引用サイトリンク】title=Advisory: NTLM Replaying via Windows 2000 Telnet Client ) * (【引用サイトリンク】title=Microsoft Windows 2000 Network DDE Escalated Privileges Vulnerability ) 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Christien Rioux」の詳細全文を読む スポンサード リンク
|